Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

P

Public Key

A public key is the publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography.

Letter for filtering (will be hidden in prod) :

P

Point-to-Point Protocol (PPP)

Point-to-point protocol (PPP) is a communication protocol between two computers that uses a serial interface, typically a personal computer connected by a phone line to a server. PPP uses the internet protocol (IP) and is sometimes considered a member of the TCP/IP suite of protocols.

Letter for filtering (will be hidden in prod) :

P

Ping Sweep

A ping sweep is a technique that is used to establish a range of ip addresses mapping to live hosts. Well-known tools with ping sweep capability include nmap for unix systems, and the pinger software from rhino9 for windows nt. There are many other tools with this capability, including: hPing, simple nomad’s icmpenum, Solarwind’s ping sweep, and Foundstone’s superscan. Pings can be detected by protocol loggers like Ippli.

Letter for filtering (will be hidden in prod) :

P

Penetration Testing

Penetration testing is also called pen testing. It is the practice of testing a computer system, network or web application to find vulnerabilities that an attacker or attacker could exploit.

Letter for filtering (will be hidden in prod) :

P

Penetration

Penetration is defined as gaining unauthorized logical access to sensitive data by evading a system’s protections.

Letter for filtering (will be hidden in prod) :

P

Promiscuous Mode

Promiscuous mode allows a network device to intercept and read each network packet that reaches in its entirety. This is used by network administrators to diagnose network problems, but also by unsavory characters who are trying to eavesdrop on network traffic (which might contain passwords or other information).

Letter for filtering (will be hidden in prod) :

P

Public Key Encryption

Public key encryption is also known as asymmetric cryptography. Public key encryption is a cryptographic system that uses two keys, a public key known to everyone and a private or secret key known only to the recipient of the message.

Letter for filtering (will be hidden in prod) :

P

Program Infector

A program infector is a piece of malware (or virus) that attaches itself to existing program files. Once the original infected program is run the virus transfers to the computer memory and may replicate itself further, spreading the infection. This type of virus can be spread beyond one’s system as soon as the infected file or program is passed to another computer.

Letter for filtering (will be hidden in prod) :

P

Public-Key Forward Secrecy (PFS)

Public-key forward secrecy (PFS) is a key agreement protocol based on asymmetric cryptography. It ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future.

Letter for filtering (will be hidden in prod) :

P

Ping Scan

A ping scan looks for machines that are responding to ICMP echo requests.